Crypto Clash: Beijing Blames US for LuBian's 127,000 BTC Bitcoin Exploit
China accuses Washington of 'draining' 127,000 BTC from LuBian in 2020. Researchers link the exploit to a flaw in key generation.
China accuses Washington of 'draining' 127,000 BTC from LuBian in 2020. Researchers link the exploit to a flaw in key generation.

Get the latest news, learn from experts, discover new tools, and find inspiration right in your inbox.
No spam. Unsubscribe anytime.
A powerful documentary on how Bitcoin and blockchain are reshaping money, power, and geopolitics—from El Salvador’s Bitcoin experiment and Europe’s regulatory revolution to the rise of decentralized finance and the new global financial order.
The debate over the attribution of LuBian's massive Bitcoin exploit of 2020 has intensified, with China's National Computer Virus Emergency Response Center (CVERC) publicly accusing the US of being the author.
This narrative clashes with the results of Western forensic research, which has identified the cause of the event as a flaw in random number generation without naming any state actor.
The incident, well documented by open sources such as Arkham, saw some 127,000 BTC moved from wallets associated with the LuBian mining pool between 28 and 29 December 2020.
The team of MilkSad research and the CVE-2023-39910 determined that the wallets were created with software that used only 32 bits of entropy for the MT19937 seed, exposing batches of P2SH-P2WPKH addresses to brute force attacks.
Forense and Final Custody
The funds, after years of dormancy, are now under the control of the US government. The Department of Justice (DOJ) is pursuing the forfeiture of some 127,271 BTC, tying them to alleged fraud and money laundering linked to Chen Zhi and the Prince Group.
Elliptic and on-chain sleuths such as ZachXBT have confirmed that the addresses cited in the DOJ's complaint overlap with LuBian's previously identified cluster of weak keys.
However, the technical teams that first identified the flaw did not claim knowledge of the perpetrator of the 2020 exploit, referring to the entity as a "hacker" or an "unknown actor".
China's Attribution Jump
The CVERC, amplified by the CCP-owned Global Times, justifies the attribution to the US on two circumstantial inferences: the four-year dormancy period of the funds (deemed abnormal for common criminality) and the subsequent final custody of the coins by the US government. CVERC's technical report is otherwise in line with independent research.
There are at least three plausible readings of the facts:
While the first two readings are in line with the evidentiary posture of the DOJ and forensic firms, the third is a political allegation unsupported by new independent technical evidence in the public domain.
Read Next
Solana withstands record 6 Tbps DDoS attack
Solana overcame one of the largest DDoS attacks in history without downtime, marking a breakthrough in network resilience.
North Korean Hackers Steal $300M with Fake Crypto Meetings
Cyber criminals linked to North Korea embezzled over $300 million from the crypto sector using fake video meetings, compromised Telegram accounts and advanced malware.
Hack on WeChat involves the co-founder of Binance
The Binance co-founder's WeChat account was hacked to push the Mubarakah meme coin in a pump-and-dump scheme.
Exploit on Yearn Finance: 2.8 million yETH attack
An 'infinite-mint' attack hit Yearn Finance's yETH, draining 2.8 million from Balancer pools and triggering an abnormal market reaction on the YFI token.